Tuesday, May 13, 2025
HomeCiscoHackers Allegedly Selling Data Stolen from Cisco

Hackers Allegedly Selling Data Stolen from Cisco

Published on

SIEM as a Service

Follow Us on Google News

A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.

The breach, allegedly carried out by a collective known as IntelBroker in collaboration with EnergyWeaponUser and zjj, has raised significant concerns across the tech industry.

Details of the Breach

According to a post on social media platform X by user H4ckManac, the compromised data includes a wide array of sensitive information.

- Advertisement - Google News

The hackers claim to have access to GitHub and GitLab projects, SonarQube projects, source code, hardcoded credentials, certificates, customer SRCs, confidential Cisco documents, Jira tickets, API tokens, AWS private buckets, Cisco technology SRCs, Docker builds, Azure storage buckets, private and public keys, SSL certificates, and Cisco premium products. 

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

The breach appears to be extensive and potentially damaging to Cisco and several other high-profile companies allegedly impacted by the data theft.

The hackers claim that the breach has affected several major corporations. Verizon, AT&T, Bank of America, Barclays, British Telecom, Microsoft, Vodafone, and Chevron are reportedly impacted.

The potential exposure of sensitive data from these companies could have far-reaching consequences for their operations and customer trust.

The hackers have allegedly provided samples of the stolen data to substantiate their claims. If verified, this breach could represent one of the most significant cybersecurity incidents in recent history.

Industry Response and Next Steps

Cisco has yet to confirm or deny the breach publicly. However, cybersecurity experts urge affected companies to take immediate action to mitigate potential risks.

This includes reviewing access logs for suspicious activity, updating security protocols, and conducting thorough audits of their systems. 

The alleged sale of such sensitive data underscores the critical importance of robust cybersecurity measures in protecting corporate assets.

As investigations continue, companies worldwide will likely reevaluate their security strategies to prevent similar incidents.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide(PDF)

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as...

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black...

APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations

The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as...

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black...